Linux Fail-over Clustering

Posted March 24, 2008 by Shijil T S

To all those who needs uninterrupted webservice here is an article that describes basic settings of how it can be done using linux servers. For this purpose we can use any Red-Hat distribution and another utility called Heartbeat. The heartbeat service provides the basic functions required for the HA system. In a cluster environment, a high availability (HA) system is responsible for starting and stopping services, mounting and dismounting resources, monitoring the system availability in the cluster environment, and handling the ownership of the virtual IP address that's…

Read more...

How to: Ruby on Rails Installation and Configuration

Posted November 28, 2007 by Shijil T S

This article will guide you through the installation of Ruby on Rails in a linux machine. As you are aware Ruby on Rails made a splash with its simplicity and ease of use for devoloping web applications. What is Ruby? Ruby is a pure object-oriented programming language with a super clean syntax that makes programming elegant and fun. Ruby successfully combines Smalltalk's conceptual elegance, Python's ease of use and learning, and Perl's pragmatism. Ruby originated in Japan in the early 1990s, and has started to become popular worldwide…

Read more...

System Admin Tools Part 11

Posted August 18, 2007 by Shijil T S

Now I am going introduce you to a set of commands that may come handy FIND [bash] find -perm 777 -type d -exec chmod 755 {} \; #Command to change all the folders under present directory with 777 to 755 find -perm 755 -type f -exec chmod 644 {} \; #Command to change all the folders under present directory with 755 to 644 find -type d -maxdepth 3 -exec cp file {} \; #Copy file to 3 levels of directories below the present directory find . -name "*.trn"…

Read more...

Introduction to Domain Name Server (DNS)

Posted May 21, 2007 by admin

Domain Name Server The DNS system forms one of the largest and most active distributed databases on the world, without which Internet would stop working. Domain name servers translate domain names to IP addresses. Every time you use a domain name, you use the Internet's domain name servers (DNS) to translate the human-readable domain name into the machine-readable IP address. How It Works Assuming no caching, let's discuss how a name server converts the domain name sparksupport.com into an IP address. A name server would start its search…

Read more...

MySQL Server Clustering:Replicating mysql databases using clustering t...

Posted April 11, 2007 by Sai Kottuvally

A realtime experience that depicts MysQl Replication Install mysql in both machines. The first machine will act as Master 1 and Slave 2 M1/S2 with ip (10.0.0.1) and the second will act as Slave 1 and Master 2 S1/M2 (10.0.0.2) Plan out which all database you want to replicate and which all you want to ignore. Synchronize both database in master and slave using rsync first. If its brand new machines then create databases in both machines, as replication doesn't mean that if you create a database in the…

Read more...

Windows Plesk Restoration: Restoring domains from a crashed hard drive

Posted March 2, 2007 by Sai Kottuvally

What if your Windows-Plesk server got crashed and surprisingly you see you don't have a plesk backup to restore. The only option remain then is to copy the plesk database, domains data, mail data, configurations,mysql databases,mssql database manually from the crashed hard drive. This article explains to how to recover data from a crashed windows-plesk server. I assume you are using plesk with mailserver as MailEnable.If you are using any other mailserver other MailEnable you have to follow their support sections to get the corresponding commands to restore…

Read more...

Protecting cPanel Servers From Common Attack

Posted February 12, 2007 by Prince Joseph

Here we will be covering some steps to take to help protect servers from common attacks Main Topics Local security measures Protecting against common remote attacks Having and following a Security Policy Make sure existing users have decent pass words Crack your own users' passwords using JTR, crack. Preferably run the crackers on a dedicated machine, not the server, due to load Crack your own users' passwords using JTR, crack Preferably run the crackers on a dedicated machine, not the server, due to load Turning off unrequired daemons…

Read more...

← Newer posts